Azure Security Center monitors the security of machines, networks, storage and data services. At present it is doing a continuous assessment of the artifacts that we have added previously. It will aid in in discovering actionable recommendations for our Virtual Machine which we have procured. Virtual Machines in the cloud can be used to develop, host, run custom software. They however need to be secured and oversight via Azure Security Center is just the thing!
In order to secure the Virtual Machine, we will use Azure Security to oversee a few security related elements:
- Manage endpoint protection issues with Azure Security Center
- Secure the Virtual Machine with Network Storage Groups (NSG)
- Enable JIT for remote desktop
Azure Security Center monitors the status of antimalware protection and reports this under the Endpoint protection issues blade. Security Center highlights issues, such as detected threats and insufficient protection, which can make your virtual machines (VMs) and computers vulnerable to antimalware threats.
Security Center reports the following endpoint protection issues:
- Endpoint protection not installed on Azure VMs – A supported antimalware solution is not installed on these Azure VMs.
Endpoint protection issues is presented as a recommendation in Security Center. this recommendation will be displayed under Prevention and under Compute.
Under Compute, select Endpoint protection issues. The Endpoint protection issues dashboard opens.
Click on Endpoint Protection not installed on Azure VMs.
Check the box for the VM and click on the Install on 1 VMs icon.
Click on the Microsoft Antimalware blade.
Click on Create
Accept Defaults and click Ok or you can select the scan option as well.
Installation will begin
When complete, return to the Azure Security Center under Compute and the Recommendation is no longer present.
This lab showed you how to implement the Security Center recommendation "Install Endpoint Protection." To learn more about enabling Microsoft Antimalware in Azure, see the following links:
- Manage endpoint protection issues with Azure Security Center
- Microsoft Antimalware for Azure Cloud Services and Virtual Machines
Azure Security Center recommends that you enable a network security group (NSG) if one is not already enabled. NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating an NSG directly to that VM.
Open the Security Center dashboard.
Select Networking. from the recommendations pane.
Oversee the Networking related recommendations and notive that there is a recommendation for NSGs on both the subnet and the VM. We will be adding the NSGs to the subnet.
Click on NSGs on subnets not enabled
This will open the Configure Missing Network Security groups for Subnets Pane.
Select Lan Lan Virtual Network.
select gab2018-dev-nsg-lan-YOURKEY as the NSG to utilize
Lastly the notification will shows itself and display Creating NSG Resource.
Once complete we can go back to the recommendations pane and after some time the issue will be shown as resolved.
Just in time virtual machine (VM) access can be used to lock down inbound traffic to your Azure VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
Open the Security Center dashboard.
In the left pane, select Just in time VM access.
The Just in time VM access blade will open.
Click the Try Just in time VM Access.
This step may have already previously been completed if you have the Standard plan already. However ,if you do not we will Apply Standard plan which is free for 60 days. Select the appropriate Name of the Subscription where your VM is located.
Azure will commence the procurement. The progress can be monitored in the Notifications area Top-Right in Azure Portal.
Once complete.
To select the VMs that you want to enable:
- Under Just in time VM access , select the Recommended tab.
- Under VIRTUAL MACHINE, select the VMs that you want to enable. This puts a checkmark next to a VM.
- Select Enable JIT on VMs.
- Select Save.
You can see the default ports that Security Center recommends you configure.
- Under Just in time VM access, select the Recommended tab.
- Under VMs, select a VM. This puts a checkmark next to the VM and opens JIT VM access configuration. This blade displays the default ports.
To request access to a VM:
- Under Just in time VM access, select the Configured tab.
- Under VMs, select the VMs that you want to enable access. This puts a checkmark next to a VM.
- Select Request access. This opens Request access.
-
Under Request access, you configure for each VM the ports to open along with the source IP that the port is opened to and the time window for which the port is opened. You can request access only to the ports that are configured in the just in time policy. Each port has a maximum allowed time derived from the just in time policy.
-
Select Open ports.
-
A notification stating that the JIT network access request initiated is being run will appear.
- Return to the JIT blade and select the Configured tab. Note the values in the Approved/LastAccess/LastUserBlade.
- You can now navigate to your VM and click on Connect. This will download an .rdp file.
- Connectivity can now be tested. Do note that the NSG rules will be augmented and perusing them will showcase this.
- Lastly to oversee the changes that Just in time has done. You can navigate to your vm and click on the Netwoking blade then the Inbound Rules. Notice the additions.